Placing the Suspect Behind the Keyboard book cover

Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.


Information Security professionals of all levels, digital forensic examiners and investigators, IT managers, InfoSec consultants, criminologists, sociologists, attorneys, law enforcement officers, Also can sell to forensic training vendors, government training courses, and high-tech crime associations.

Paperback, 320 Pages

Published: February 2013

Imprint: Syngress

ISBN: 978-1-59749-985-9


  • "I would highly recommend the book to anyone in the field of digital investigation, computer forensics, or who may just have an interest in the fascinating world of cybercrime investigation. This is a must read for any aspiring novice cybercrime investigator and the seasoned professional computer guru as well as a needed addition to any digital investigator’s library."--Journal of Digital Forensics, Security and Law, Volume 8(2), 2013
    "This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read."--Help Net Security online, September 5, 2013


  • Chapter 1. Introduction

    Chapter 2. High Tech Interview

    Chapter 3. Physical Investigations

    Chapter 4. Technical Investigations

    Chapter 5. Putting it all Together

    Chapter 6. Investigative Case Management

    Chapter 7. Case Presentation

    Chapter 8. Cheat Sheets and Quickstart Guides

    Chapter 9. Some Things will Become Easier, Others Not So Much

    Chapter 10. Online Investigations

    Chapter 11. Case Studies


advert image